Question: 8 . Create an organization - wide policy defining and authorizing a security or computer incident response team to have full access to and authority

8. Create an organization-wide policy defining and authorizing a security or computer incident response team to have full access to and authority over all IT systems, applications, data, and physical IT assets when a security or other incident occurs. Create this for the Sunshine Credit Union, which has the following characteristics:
The organization is a regional XYZ Credit Union that has multiple branches and locations throughout the region;
Online banking and use of the Internet are the banks strengths, given its limited human resources;
The customer service department is the organizations most critical business function;
The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees;
The organization wants to monitor and control use of the Internet by implementing content filtering;
The organization wants to eliminate personal use of organization-owned IT assets and systems;
The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls;
The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training;
The organization wants to create a security or computer incident response team to deal with security breaches and other incidents if attacked providing full authority for the team to perform whatever activities are needed to maintain chain of custody in performing forensics and evidence collection;
The organization wants to implement this policy throughout the organization to provide full authority during crisis to the CIRT team members over all physical facilities, IT assets, IT systems, applications, and data owned by the organization.
Using the following template, in your text document, create a computer incident response policy granting team members full access and authority to perform forensics and to maintain a chain of custody for physical evidence containment.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!